Cyber Incident Reporting for Critical Infrastructure Act of 2022 Listening Sessions, 55830-55833 [2022-19550]
Download as PDF
55830
Federal Register / Vol. 87, No. 175 / Monday, September 12, 2022 / Notices
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
National Institutes of Health
National Institute of Neurological
Disorders and Stroke; Notice of Closed
Meetings
lotter on DSK11XQN23PROD with NOTICES1
Pursuant to section 10(d) of the
Federal Advisory Committee Act, as
amended, notice is hereby given of the
following meetings.
The meetings will be closed to the
public in accordance with the
provisions set forth in sections
552b(c)(4) and 552b(c)(6), Title 5 U.S.C.,
as amended. The grant applications and
the discussions could disclose
confidential trade secrets or commercial
property such as patentable material,
and personal information concerning
individuals associated with the grant
applications, the disclosure of which
would constitute a clearly unwarranted
invasion of personal privacy.
Name of Committee: National Institute of
Neurological Disorders and Stroke Special
Emphasis Panel; JSPTPN T32 Training Grant
Review Meeting.
Date: October 3, 2022.
Closed: 9:00 a.m. to 6:00 p.m.
Agenda: To review and evaluate grant
applications.
Place: National Institutes of Health,
Neuroscience Center, 6001 Executive
Boulevard, Rockville, MD 20852 (Virtual
Meeting).
Contact Person: Abhignya Subedi, Ph.D.,
Scientific Review Officer, Scientific Review
Branch, Division of Extramural Activities,
NINDS/NIH, NSC, 6001 Executive Boulevard,
Bethesda, MD 20892, 301–496–9223,
abhi.subedi@nih.gov.
Name of Committee: National Institute of
Neurological Disorders and Stroke Initial
Review Group; Neurological Sciences and
Disorders C Study Section Translational
Neural, Brain, and Pain Relief Devices (NSD–
C).
Date: October 3–4, 2022.
Closed: 10:00 a.m. to 6:00 p.m.
Agenda: To review and evaluate grant
applications.
Place: National Institutes of Health,
Neuroscience Center, 6001 Executive
Boulevard, Rockville, MD 20852 (Virtual
Meeting).
Contact Person: Ana Olariu, Ph.D.,
Scientific Review Officer, Scientific Review
Branch, Division of Extramural Activities,
NINDS/NIH, NSC, 6001 Executive Boulevard,
Bethesda, MD 20892, 301–496–9223,
Ana.Olariu@nih.gov.
Name of Committee: Neurological Sciences
Training Initial Review Group; NST–2 Study
Section.
Date: October 6–7, 2022.
Closed: 10:00 a.m. to 6:00 p.m.
Agenda: To review and evaluate grant
applications and/or proposals.
Place: National Institutes of Health,
Neuroscience Center, 6001 Executive
VerDate Sep<11>2014
17:06 Sep 09, 2022
Jkt 256001
Boulevard, Rockville, MD 20852 (Virtual
Meeting).
Contact Person: Deanna Lynn Adkins,
Ph.D., Scientific Review Officer, Scientific
Review Branch, Division of Extramural
Activities, NINDS/NIH, NSC, 6001 Executive
Boulevard, Bethesda, MD 20892, 301–496–
9223, deanna.adkins@nih.gov.
Name of Committee: National Institute of
Neurological Disorders and Stroke Special
Emphasis Panel; HEAL Initiative: Planning
Studies for Initial Analgesic Development
[Small Molecules and Biologics] (R61
Clinical Trial Not Allowed).
Date: October 6, 2022.
Closed: 10:00 a.m. to 6:00 p.m.
Agenda: To review and evaluate grant
applications.
Place: National Institutes of Health,
Neuroscience Center, 6001 Executive
Boulevard, Rockville, MD 20852 (Virtual
Meeting).
Contact Person: Bo-Shiun Chen, Ph.D.,
Scientific Review Officer, Scientific Review
Branch, Division of Extramural Activities,
NINDS/NIH, NSC, 6001 Executive Boulevard,
Bethesda, MD 20892, 301–496–9223, boshiun.chen@nih.gov.
Name of Committee: National Institute of
Neurological Disorders and Stroke Special
Emphasis Panel; Exploratory Team-Research
BRAIN Circuit Program.
Date: October 7, 2022.
Closed: 9:00 a.m. to 5:00 p.m.
Agenda: To review and evaluate grant
applications.
Place: Canopy by Hilton, 940 Rose Avenue,
North Bethesda, MD 20852.
Contact Person: Tatiana Pasternak, Ph.D.,
Scientific Review Officer, Scientific Review
Branch, 6001 Executive Boulevard, NINDS/
NIH, NSC, 6001 Executive Boulevard, Suite
3208, MSC 9529, Bethesda, MD 20892, 301–
496–9223, tatiana.pasternak@nih.gov.
(Catalogue of Federal Domestic Assistance
Program Nos. 93.853, Clinical Research
Related to Neurological Disorders; 93.854,
Biological Basis Research in the
Neurosciences, National Institutes of Health.)
Dated: September 6, 2022.
Tyeshia M. Roberson-Curtis,
Program Analyst, Office of Federal Advisory
Committee Policy.
[FR Doc. 2022–19608 Filed 9–9–22; 8:45 am]
BILLING CODE 4140–01–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
National Institute of Allergy and
Infectious Diseases; Notice of Closed
Meeting
Pursuant to section 10(d) of the
Federal Advisory Committee Act, as
amended, notice is hereby given of the
following meeting.
The meeting will be closed to the
public in accordance with the
provisions set forth in sections
Frm 00052
Fmt 4703
Sfmt 4703
Name of Committee: National Institute of
Allergy and Infectious Diseases Special
Emphasis Panel; Preclinical Services for
Biopharmaceutical Product Development
(N01).
Date: October 3–14, 2022.
Time: 10 a.m. to 5 p.m.
Agenda: To review and evaluate contract
proposals.
Place: National Institute of Allergy and
Infectious Diseases, National Institutes of
Health, 5601 Fishers Lane, Room 3F36,
Rockville, MD 20892 (Virtual Meeting).
Contact Person: Noton K. Dutta, Ph.D.,
Scientific Review Officer, Scientific Review
Program, Division of Extramural Activities,
National Institute of Allergy and Infectious
Diseases, National Institutes of Health, 5601
Fishers Lane, Room 3F36, Rockville, MD
20852, 240–669–2857, noton.dutta@nih.gov.
(Catalogue of Federal Domestic Assistance
Program Nos. 93.855, Allergy, Immunology,
and Transplantation Research; 93.856,
Microbiology and Infectious Diseases
Research, National Institutes of Health, HHS)
Dated: September 6, 2022.
Tyeshia M. Roberson-Curtis,
Program Analyst, Office of Federal Advisory
Committee Policy.
[FR Doc. 2022–19602 Filed 9–9–22; 8:45 am]
BILLING CODE 4140–01–P
DEPARTMENT OF HOMELAND
SECURITY
[Docket ID: CISA–2022–0010]
Cyber Incident Reporting for Critical
Infrastructure Act of 2022 Listening
Sessions
Cybersecurity and
Infrastructure Security Agency,
Department of Homeland Security
ACTION: Notice of public listening
sessions.
AGENCY:
The Cybersecurity and
Infrastructure Security Agency (CISA) is
announcing a series of public listening
sessions to receive input as CISA
develops proposed regulations required
by the Cyber Incident Reporting for
Critical Infrastructure Act of 2022
(CIRCIA). CISA is interested in receiving
public input on potential aspects of the
proposed regulations prior to their
publication in a Notice of Proposed
Rulemaking (NPRM), and issued a
request for information in the Federal
SUMMARY:
National Institutes of Health
PO 00000
552b(c)(4) and 552b(c)(6), Title 5 U.S.C.,
as amended. The contract proposals and
the discussions could disclose
confidential trade secrets or commercial
property such as patentable material,
and personal information concerning
individuals associated with the contract
proposals, the disclosure of which
would constitute a clearly unwarranted
invasion of personal privacy.
E:\FR\FM\12SEN1.SGM
12SEN1
lotter on DSK11XQN23PROD with NOTICES1
Federal Register / Vol. 87, No. 175 / Monday, September 12, 2022 / Notices
Register on September 12, 2022 (the
‘‘RFI’’) as a means to receive that input.
These public listening sessions are
intended to serve as an additional
means for interested parties to provide
input to CISA on the topics identified in
the RFI prior to the publication of the
NPRM.
DATES: Public listening sessions are
scheduled to be held on the following
dates at the following locations:
Salt Lake City, Utah—September 21,
2022; Taylorsville State Office Building,
4315 S 2700 W, Taylorsville, UT 84129.
Atlanta, Georgia—September 28,
2022; Georgia Emergency Management
Administration Building, 935 United
Avenue SE, Atlanta, GA 30316.
Chicago, Illinois—October 5, 2022;
536 S. Clark/101 W. Ida B. Wells
Federal Building, USCIS Auditorium,
536 S. Clark Street/101 W. Ida B. Wells
Drive, Chicago, IL 60605.
Dallas/Fort Worth, Texas—October 5,
2022; Fritz G. Lanham Federal Building,
819 Taylor Street, Fort Worth, TX
76102.
New York, New York—October 12,
2022; Alexander Hamilton U.S. Custom
House Smithsonian Museum of the
American Indian, 1 Bowling Green, New
York, NY 10004.
Philadelphia, Pennsylvania—October
13, 2022; Federal Reserve Bank, 10 N.
Independence Mall, W Philadelphia, PA
19106.
Oakland, California—October 26,
2022; Ronald V. Dellums Federal
Building, 1301 Clay Street, Oakland, CA
94612.
Boston, Massachusetts—November 2,
2022; Tip O’Neill Federal Building, 10
Causeway, Boston, MA 02222.
Seattle, Washington—November 9,
2022; Henry Jackson Federal Building,
915 2nd Avenue, Seattle, WA 98104.
Kansas City, Missouri—November 16,
2022; Two Pershing Square, 2300 Main
Street, Kansas City, MO 64108.
CISA also plans to host a listening
session in Washington, DC; however, a
date and location for that session has
not yet been finalized. CISA will
publish a supplemental notice in the
Federal Register containing the date
and location of the Washington, DC
listening session once those details have
been finalized.
All of the listening sessions are
tentatively scheduled to occur from 11
a.m.–3 p.m. local time. CISA reserves
the right to reschedule, move to virtual,
or cancel any of these sessions for any
reason, including a health emergency,
severe weather, or an incident that
impacts the ability of CISA to safely
conduct these sessions in person at the
proposed date, time, and location. Any
VerDate Sep<11>2014
17:06 Sep 09, 2022
Jkt 256001
changes or updates to dates, locations,
or start and end times for these listening
sessions, to include the date and
location for the Washington, DC
listening session, will be posted on
www.cisa.gov/circia.
CISA is committed to ensuring all
participants have equal access to these
sessions regardless of disability status. If
you require reasonable accommodation
due to a disability to fully participate,
please contact CISA at circia@
cisa.dhs.gov or (202) 964–6869 as soon
as possible prior to the session you wish
to attend.
Registration is encouraged for these
public listening sessions and priority
access will be given to individuals who
register. To register, please visit
www.cisa.gov/circia and follow the
instructions available there to complete
registration. Registration for each inperson listening session will be
accepted until 5 p.m. (eastern daylight
time) two days before the listening
session.
FOR FURTHER INFORMATION CONTACT:
Todd Klessman, Cyber Incident
Reporting for Critical Infrastructure Act
of 2022 (CIRCIA) Rulemaking Team
Lead, Cybersecurity and Infrastructure
Security Agency, circia@cisa.dhs.gov,
202–964–6869.
SUPPLEMENTARY INFORMATION:
I. Background
The growing number of cyber
incidents, including ransomware
attacks, is one of the most serious
economic and national security threats
our nation faces. From the theft of
private, financial, or other sensitive
data, to cyber-attacks that damage
computer networks or facilitate the
manipulation of operational or other
control systems, cyber incidents are
capable of causing significant, lasting
harm.
Reporting cyber incidents and ransom
payments to the government has many
benefits. An organization that is a victim
of a cyber incident, including those that
result in ransom payments, can receive
assistance from government agencies
that are prepared to investigate the
incident, mitigate its consequences, and
help prevent future incidents through
analysis and sharing of cyber threat
information. CISA and our federal law
enforcement partners have highly
trained investigators who specialize in
responding to cyber incidents for the
express purpose of disrupting threat
actors who caused the incident, and
providing technical assistance to protect
assets, mitigate vulnerabilities, and offer
on-scene response personnel to aid in
incident recovery. When supporting
PO 00000
Frm 00053
Fmt 4703
Sfmt 4703
55831
affected entities, the various agencies of
the Federal Government work in tandem
to leverage their collective response
expertise, apply their knowledge of
cyber threats, preserve key evidence,
and use their combined authorities and
capabilities both to minimize asset
vulnerability and bring malicious actors
to justice. Timely reporting of incidents
also allows CISA to share information
about indicators of compromise, tactics,
techniques, procedures, and best
practices to reduce the risk of a cyber
incident propagating within and across
sectors.
Recognizing the importance of cyber
incident and ransom payment reporting,
in March 2022, Congress passed and
President Biden signed the Cyber
Incident Reporting for Critical
Infrastructure Act of 2022 (CIRCIA),
Public Law 117–103, Div. Y (2022) (to
be codified at 6 U.S.C. 681–681g).
Enactment of CIRCIA marks an
important milestone in improving
America’s cybersecurity by, among
other things, requiring CISA to develop
and implement regulations requiring
covered entities to report covered cyber
incidents and ransom payments to
CISA. These reports will allow CISA, in
conjunction with other federal partners,
to rapidly deploy resources and render
assistance to victims suffering attacks,
analyze incoming reporting across
sectors to spot trends and understand
how malicious cyber actors are
perpetrating their attacks, and quickly
share that information with network
defenders to warn other potential
victims.
Some of these new authorities are
regulatory in nature and require CISA to
complete rulemaking activities before
the reporting requirements go into
effect. CIRCIA requires that CISA
develop and publish a Notice of
Proposed Rulemaking (NPRM), which
will be open to public comment, and a
Final Rule. CIRCIA also mandates that
CISA consult with various entities,
including Sector Risk Management
Agencies, the Department of Justice, and
the DHS-chaired Cyber Incident
Reporting Council, throughout the
rulemaking process. CISA is working to
complete these activities within the
statutorily mandated timeframes. In
addition to the consultations required
by CIRCIA, CISA is interested in
receiving input from the public on the
best approaches to implementing
various aspects of this new regulatory
authority. To help support the gathering
of this input, on September 12, 2022,
CISA published a Request for
Information in the Federal Register.
E:\FR\FM\12SEN1.SGM
12SEN1
lotter on DSK11XQN23PROD with NOTICES1
55832
Federal Register / Vol. 87, No. 175 / Monday, September 12, 2022 / Notices
II. Purpose
These public listening sessions are
intended to serve as an additional
means for interested parties to provide
input to CISA on aspects of the
proposed regulations prior to the
publication of the NPRM. While CISA
welcomes input on other aspects of
CIRCIA’s regulatory requirements, CISA
is particularly interested in input on
definitions for and interpretations of the
terminology to be used in the proposed
regulations; the form, manner, content,
and procedures for submission of
reports required under CIRCIA;
information regarding other incident
reporting requirements, including the
requirement to report a description of
the vulnerabilities exploited; and other
policies and procedures, such as
enforcement procedures and
information protection policies, that
will be required for implementation of
the regulations. Key areas within these
four topical areas on which CISA is
particularly interested in receiving
stakeholder input are enumerated in
section IV below.
sessions will be provided in the
electronic docket for the CIRCIA
rulemaking, docket CISA–2022–0010,
available at https://www.regulations.gov.
CISA also plans on holding sectorspecific listening sessions at dates and
times to-be-determined. Information
about those listening sessions will be
available on www.cisa.gov/circia when
it becomes available. Feedback from
those listening sessions will be added to
the rulemaking docket for public
consideration. Additionally, written
comments on proposed elements of the
CIRCIA regulations may also be
submitted in response to CISA’s RFI via
the Federal eRulemaking Portal
identified by docket number CISA–
2022–0010 through the duration of the
RFI’s comment period.
III. Public Listening Session Procedures
and Participation
As the sole intent of the public
listening sessions is to allow the general
public to provide input to CISA on
aspects of potential approaches to
implementing CIRCIA’s regulatory
requirements, the sessions have been
designed to facilitate one-way
communication. Outside of introductory
and logistical remarks, CISA will not be
providing substantive information on
CIRCIA or potential content of the
NPRM, or responding to comments
during the public listening sessions.
Each listening session is open to the
public and each is expected to last up
to a total of four hours. To allow as
many members of the public as possible
to speak, we are requesting speakers
limit their remarks to three minutes.
Attendance at these listening sessions
will be capped consistent with room
capacity limitations at each location.
Participants are encouraged to register
for their desired session via an on-line
registration form available at
www.cisa.gov/circia. Registered
individuals will be provided priority
access to the room and the opportunity
to speak before individuals who did not
register. Please note that a public
meeting may adjourn early if all
commenters present have had the
opportunity to speak prior to the
scheduled conclusion of the meeting.
All comments made during the sessions
will be documented and transcribed by
CISA. A final transcript of each of these
(1) Definitions, Criteria, and Scope of
Regulatory Coverage
a. The meaning of ‘‘covered entity,’’
consistent with the definition provided
in section 2240(5) of the Homeland
Security Act of 2002 (as amended),
taking into consideration the factors
listed in section 2242(c)(1).
b. The number of entities, either
overall or in a specific industry or
sector, likely to be ‘‘covered entities’’
under the definition provided in section
2240(5) of the Homeland Security Act of
2002 (as amended), taking into
consideration the factors listed in
section 2242(c)(1).
c. The meaning of ‘‘covered cyber
incident,’’ consistent with the definition
provided in section 2240(4), taking into
account the requirements,
considerations, and exclusions in
section 2242(c)(2)(A), (B), and (C),
respectively. Additionally, the extent to
which the definition of ‘‘covered cyber
incident’’ under CIRCIA is similar to or
different from the definition used to
describe cyber incidents that must be
reported under other existing federal
regulatory programs.
d. The number of covered cyber
incidents likely to occur on an annual
basis either in total or within a specific
industry or sector.
e. The meaning of ‘‘substantial cyber
incident.’’
f. The meaning of ‘‘ransom payment’’
and ‘‘ransomware attack,’’ consistent
with the definitions provided in section
2240(13) and (14).
VerDate Sep<11>2014
17:06 Sep 09, 2022
Jkt 256001
IV. Key Inputs Solicited by the Agency
The below non-exhaustive list of
topics, which mirrors those contained in
the RFI, is meant to assist members of
the public in the formulation of
comments and is not intended to restrict
the issues that commenters may
address:
PO 00000
Frm 00054
Fmt 4703
Sfmt 4703
g. The number of ransom payments
likely to be made by covered entities on
an annual basis.
h. The meaning of ‘‘supply chain
compromise,’’ consistent with the
definition in section 2240(17).
i. The criteria for determining if an
entity is a multi-stakeholder
organization that develops, implements,
and enforces policies concerning the
Domain Name System (as described in
section 2242(a)(5)(C)).
j. Any other terms for which a
definition, or clarification of the
definition for the term contained in
CIRCIA, would improve the regulations
and proposed definitions for those
terms, consistent with any definitions
provided for those terms in CIRCIA.
(2) Report Contents and Submission
Procedures
a. How covered entities should submit
reports on covered cyber incidents, the
specific information that should be
required to be included in the reports
(taking into consideration the
requirements in section 2242(c)(4)), any
specific format or manner in which
information should be submitted (taking
into consideration the requirements in
section 2242(c)(8)(A)), any specific
information that should be included in
reports to facilitate appropriate sharing
of reports among federal partners, and
any other aspects of the process,
manner, form, content, or other items
related to covered cyber incident
reporting that would be beneficial for
CISA to clarify in the regulations.
b. What constitutes ‘‘reasonable
belief’’ that a covered cyber incident has
occurred, which would initiate the time
for the 72-hour deadline for reporting
covered cyber incidents under section
2242(a)(1).
c. How covered entities should submit
reports on ransom payments, the
specific information that should be
required to be included in the reports
(taking into consideration the
requirements in section 2242(c)(5)), any
specific format or manner in which
information should be submitted (taking
into consideration the requirements in
section 2242(c)(8)(A)), and any other
aspects of the process, manner, form,
content, or other items related to ransom
payments that would be beneficial for
CISA to clarify in the regulations.
d. When should the time for the 24hour deadline for reporting ransom
payments begin (i.e., when a ransom
payment is considered to have been
‘‘made’’).
e. How covered entities should submit
supplemental reports, what specific
information should be included in
supplemental reports, any specific
E:\FR\FM\12SEN1.SGM
12SEN1
Federal Register / Vol. 87, No. 175 / Monday, September 12, 2022 / Notices
format or manner in which
supplemental report information should
be submitted, the criteria by which a
covered entity determines ‘‘that the
covered cyber incident at issue has
concluded and has been fully mitigated
and resolved,’’ and any other aspects of
the process, manner, form, content, or
other items related to supplemental
reports that would be beneficial for
CISA to clarify in the regulations.
f. The timing for submission of
supplemental reports and what
constitutes ‘‘substantial new or different
information,’’ taking into account the
considerations in section 2242(c)(7)(B)
and (C).
g. What CISA should consider when
‘‘balanc[ing] the need for situational
awareness with the ability of the
covered entity to conduct cyber incident
response and investigations’’ when
establishing deadlines and criteria for
supplemental reports.
h. Guidelines or procedures regarding
the use of third-party submitters,
consistent with section 2242(d).
i. Covered entity information
preservation requirements, such as the
types of data to be preserved, how
covered entities should be required to
preserve information, how long
information must be preserved,
allowable uses of information preserved
by covered entities, and any specific
processes or procedures governing
covered entity information preservation.
j. To clarify or supplement the
examples provided in section
2242(d)(1), what constitutes a thirdparty entity who may submit a covered
cyber incident report or ransom
payment report on behalf of a covered
entity.
k. How a third party can meet its
responsibility to advise an impacted
covered entity of its ransom payment
reporting responsibilities under section
2242(d)(4).
lotter on DSK11XQN23PROD with NOTICES1
(3) Other Incident Reporting
Requirements and Security
Vulnerability Information Sharing
a. Other existing or proposed federal
or state regulations, directives, or
similar policies that require reporting of
cyber incidents or ransom payments,
and any areas of actual, likely, or
potential overlap, duplication, or
conflict between those regulations,
directives, or policies and CIRCIA’s
reporting requirements.
b. What federal departments,
agencies, commissions, or other federal
entities receive reports of cyber
incidents or ransom payments from
critical infrastructure owners and
operators.
VerDate Sep<11>2014
17:06 Sep 09, 2022
Jkt 256001
c. The amount it typically costs and
time it takes, including personnel salary
costs (with associated personnel titles if
possible), to compile and report
information about a cyber incident
under existing reporting requirements or
voluntary sharing, and the impact that
the size or type of cyber incident may
have on the estimated cost of reporting.
d. The amount it costs per incident to
use a third-party entity to submit a
covered cyber incident report or ransom
payment report on behalf of a covered
entity.
e. The amount it typically costs to
retain data related to cyber incidents.
f. Criteria or guidance CISA should
use to determine if a report provided to
another federal entity constitutes
‘‘substantially similar reported
information.’’
g. What constitutes a ‘‘substantially
similar timeframe’’ for submission of a
report to another federal entity.
h. Principles governing the timing and
manner in which information relating to
security vulnerabilities may be shared,
including any common industry best
practices and United States or
international standards.
(4) Additional Policies, Procedures, and
Requirements
a. Policies, procedures, and
requirements related to the enforcement
of regulatory requirements, to include
the issuance of requests for information,
subpoenas, and civil actions consistent
with section 2244.
b. Information on protections for
reporting entities under section 2245.
c. Any other policies, procedures, or
requirements that it would benefit the
regulated community for CISA to
address in the proposed rule.
CISA notes that these public meetings
are being held solely for information
and program-planning purposes. Inputs
provided during the public meetings do
not bind CISA to any further actions.
ACTION:
55833
Request for information.
The Cybersecurity and
Infrastructure Security Agency (CISA) is
issuing this Request for Information
(RFI) to receive input from the public as
CISA develops proposed regulations
required by the Cyber Incident
Reporting for Critical Infrastructure Act
of 2022 (CIRCIA). Among other things,
CIRCIA directs CISA to develop and
oversee implementation of regulations
requiring covered entities to submit to
CISA reports detailing covered cyber
incidents and ransom payments. CIRCIA
requires CISA to publish a Notice of
Proposed Rulemaking (NPRM) within
24 months of the date of enactment of
CIRCIA as part of the process for
developing these regulations. CISA is
interested in receiving public input on
potential aspects of the proposed
regulation prior to publication of the
NPRM and is issuing this RFI as a
means to receive that input. While CISA
welcomes input on other aspects of
CIRCIA’s regulatory requirements, CISA
is particularly interested in input on
definitions for and interpretations of the
terminology to be used in the proposed
regulations; the form, manner, content,
and procedures for submission of
reports required under CIRCIA;
information regarding other incident
reporting requirements including the
requirement to report a description of
the vulnerabilities exploited; and other
policies and procedures, such as
enforcement procedures and
information protection policies, that
will be required for implementation of
the regulations.
SUMMARY:
Written comments are requested
on or before November 14, 2022.
Submissions received after that date
may not be considered.
DATES:
DEPARTMENT OF HOMELAND
SECURITY
You may submit comments,
identified by Docket ID: CISA–2022–
0010, through the Federal eRulemaking
Portal: https://www.regulations.gov.
Follow the instructions contained
therein and below for submitting
comments. Please note that this RFI
period is not rulemaking, and the
Federal Rulemaking Portal is being
utilized only as a mechanism for
receiving comments.
[Docket ID: CISA–2022–0010]
FOR FURTHER INFORMATION CONTACT:
Jennie M. Easterly,
Director, Cybersecurity and Infrastructure
Security Agency.
[FR Doc. 2022–19550 Filed 9–9–22; 8:45 am]
BILLING CODE P
Request for Information on the Cyber
Incident Reporting for Critical
Infrastructure Act of 2022
Cybersecurity and
Infrastructure Security Agency,
Department of Homeland Security.
AGENCY:
PO 00000
Frm 00055
Fmt 4703
Sfmt 4703
ADDRESSES:
Todd Klessman, Cyber Incident
Reporting for Critical Infrastructure Act
of 2022 (CIRCIA) Rulemaking Team
Lead, Cybersecurity and Infrastructure
Security Agency, circia@cisa.dhs.gov,
202–964–6869.
SUPPLEMENTARY INFORMATION:
E:\FR\FM\12SEN1.SGM
12SEN1
Agencies
[Federal Register Volume 87, Number 175 (Monday, September 12, 2022)]
[Notices]
[Pages 55830-55833]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-19550]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
[Docket ID: CISA-2022-0010]
Cyber Incident Reporting for Critical Infrastructure Act of 2022
Listening Sessions
AGENCY: Cybersecurity and Infrastructure Security Agency, Department of
Homeland Security
ACTION: Notice of public listening sessions.
-----------------------------------------------------------------------
SUMMARY: The Cybersecurity and Infrastructure Security Agency (CISA) is
announcing a series of public listening sessions to receive input as
CISA develops proposed regulations required by the Cyber Incident
Reporting for Critical Infrastructure Act of 2022 (CIRCIA). CISA is
interested in receiving public input on potential aspects of the
proposed regulations prior to their publication in a Notice of Proposed
Rulemaking (NPRM), and issued a request for information in the Federal
[[Page 55831]]
Register on September 12, 2022 (the ``RFI'') as a means to receive that
input. These public listening sessions are intended to serve as an
additional means for interested parties to provide input to CISA on the
topics identified in the RFI prior to the publication of the NPRM.
DATES: Public listening sessions are scheduled to be held on the
following dates at the following locations:
Salt Lake City, Utah--September 21, 2022; Taylorsville State Office
Building, 4315 S 2700 W, Taylorsville, UT 84129.
Atlanta, Georgia--September 28, 2022; Georgia Emergency Management
Administration Building, 935 United Avenue SE, Atlanta, GA 30316.
Chicago, Illinois--October 5, 2022; 536 S. Clark/101 W. Ida B.
Wells Federal Building, USCIS Auditorium, 536 S. Clark Street/101 W.
Ida B. Wells Drive, Chicago, IL 60605.
Dallas/Fort Worth, Texas--October 5, 2022; Fritz G. Lanham Federal
Building, 819 Taylor Street, Fort Worth, TX 76102.
New York, New York--October 12, 2022; Alexander Hamilton U.S.
Custom House Smithsonian Museum of the American Indian, 1 Bowling
Green, New York, NY 10004.
Philadelphia, Pennsylvania--October 13, 2022; Federal Reserve Bank,
10 N. Independence Mall, W Philadelphia, PA 19106.
Oakland, California--October 26, 2022; Ronald V. Dellums Federal
Building, 1301 Clay Street, Oakland, CA 94612.
Boston, Massachusetts--November 2, 2022; Tip O'Neill Federal
Building, 10 Causeway, Boston, MA 02222.
Seattle, Washington--November 9, 2022; Henry Jackson Federal
Building, 915 2nd Avenue, Seattle, WA 98104.
Kansas City, Missouri--November 16, 2022; Two Pershing Square, 2300
Main Street, Kansas City, MO 64108.
CISA also plans to host a listening session in Washington, DC;
however, a date and location for that session has not yet been
finalized. CISA will publish a supplemental notice in the Federal
Register containing the date and location of the Washington, DC
listening session once those details have been finalized.
All of the listening sessions are tentatively scheduled to occur
from 11 a.m.-3 p.m. local time. CISA reserves the right to reschedule,
move to virtual, or cancel any of these sessions for any reason,
including a health emergency, severe weather, or an incident that
impacts the ability of CISA to safely conduct these sessions in person
at the proposed date, time, and location. Any changes or updates to
dates, locations, or start and end times for these listening sessions,
to include the date and location for the Washington, DC listening
session, will be posted on www.cisa.gov/circia.
CISA is committed to ensuring all participants have equal access to
these sessions regardless of disability status. If you require
reasonable accommodation due to a disability to fully participate,
please contact CISA at [email protected] or (202) 964-6869 as soon as
possible prior to the session you wish to attend.
Registration is encouraged for these public listening sessions and
priority access will be given to individuals who register. To register,
please visit www.cisa.gov/circia and follow the instructions available
there to complete registration. Registration for each in-person
listening session will be accepted until 5 p.m. (eastern daylight time)
two days before the listening session.
FOR FURTHER INFORMATION CONTACT: Todd Klessman, Cyber Incident
Reporting for Critical Infrastructure Act of 2022 (CIRCIA) Rulemaking
Team Lead, Cybersecurity and Infrastructure Security Agency,
[email protected], 202-964-6869.
SUPPLEMENTARY INFORMATION:
I. Background
The growing number of cyber incidents, including ransomware
attacks, is one of the most serious economic and national security
threats our nation faces. From the theft of private, financial, or
other sensitive data, to cyber-attacks that damage computer networks or
facilitate the manipulation of operational or other control systems,
cyber incidents are capable of causing significant, lasting harm.
Reporting cyber incidents and ransom payments to the government has
many benefits. An organization that is a victim of a cyber incident,
including those that result in ransom payments, can receive assistance
from government agencies that are prepared to investigate the incident,
mitigate its consequences, and help prevent future incidents through
analysis and sharing of cyber threat information. CISA and our federal
law enforcement partners have highly trained investigators who
specialize in responding to cyber incidents for the express purpose of
disrupting threat actors who caused the incident, and providing
technical assistance to protect assets, mitigate vulnerabilities, and
offer on-scene response personnel to aid in incident recovery. When
supporting affected entities, the various agencies of the Federal
Government work in tandem to leverage their collective response
expertise, apply their knowledge of cyber threats, preserve key
evidence, and use their combined authorities and capabilities both to
minimize asset vulnerability and bring malicious actors to justice.
Timely reporting of incidents also allows CISA to share information
about indicators of compromise, tactics, techniques, procedures, and
best practices to reduce the risk of a cyber incident propagating
within and across sectors.
Recognizing the importance of cyber incident and ransom payment
reporting, in March 2022, Congress passed and President Biden signed
the Cyber Incident Reporting for Critical Infrastructure Act of 2022
(CIRCIA), Public Law 117-103, Div. Y (2022) (to be codified at 6 U.S.C.
681-681g). Enactment of CIRCIA marks an important milestone in
improving America's cybersecurity by, among other things, requiring
CISA to develop and implement regulations requiring covered entities to
report covered cyber incidents and ransom payments to CISA. These
reports will allow CISA, in conjunction with other federal partners, to
rapidly deploy resources and render assistance to victims suffering
attacks, analyze incoming reporting across sectors to spot trends and
understand how malicious cyber actors are perpetrating their attacks,
and quickly share that information with network defenders to warn other
potential victims.
Some of these new authorities are regulatory in nature and require
CISA to complete rulemaking activities before the reporting
requirements go into effect. CIRCIA requires that CISA develop and
publish a Notice of Proposed Rulemaking (NPRM), which will be open to
public comment, and a Final Rule. CIRCIA also mandates that CISA
consult with various entities, including Sector Risk Management
Agencies, the Department of Justice, and the DHS-chaired Cyber Incident
Reporting Council, throughout the rulemaking process. CISA is working
to complete these activities within the statutorily mandated
timeframes. In addition to the consultations required by CIRCIA, CISA
is interested in receiving input from the public on the best approaches
to implementing various aspects of this new regulatory authority. To
help support the gathering of this input, on September 12, 2022, CISA
published a Request for Information in the Federal Register.
[[Page 55832]]
II. Purpose
These public listening sessions are intended to serve as an
additional means for interested parties to provide input to CISA on
aspects of the proposed regulations prior to the publication of the
NPRM. While CISA welcomes input on other aspects of CIRCIA's regulatory
requirements, CISA is particularly interested in input on definitions
for and interpretations of the terminology to be used in the proposed
regulations; the form, manner, content, and procedures for submission
of reports required under CIRCIA; information regarding other incident
reporting requirements, including the requirement to report a
description of the vulnerabilities exploited; and other policies and
procedures, such as enforcement procedures and information protection
policies, that will be required for implementation of the regulations.
Key areas within these four topical areas on which CISA is particularly
interested in receiving stakeholder input are enumerated in section IV
below.
III. Public Listening Session Procedures and Participation
As the sole intent of the public listening sessions is to allow the
general public to provide input to CISA on aspects of potential
approaches to implementing CIRCIA's regulatory requirements, the
sessions have been designed to facilitate one-way communication.
Outside of introductory and logistical remarks, CISA will not be
providing substantive information on CIRCIA or potential content of the
NPRM, or responding to comments during the public listening sessions.
Each listening session is open to the public and each is expected to
last up to a total of four hours. To allow as many members of the
public as possible to speak, we are requesting speakers limit their
remarks to three minutes. Attendance at these listening sessions will
be capped consistent with room capacity limitations at each location.
Participants are encouraged to register for their desired session via
an on-line registration form available at www.cisa.gov/circia.
Registered individuals will be provided priority access to the room and
the opportunity to speak before individuals who did not register.
Please note that a public meeting may adjourn early if all commenters
present have had the opportunity to speak prior to the scheduled
conclusion of the meeting. All comments made during the sessions will
be documented and transcribed by CISA. A final transcript of each of
these sessions will be provided in the electronic docket for the CIRCIA
rulemaking, docket CISA-2022-0010, available at https://www.regulations.gov.
CISA also plans on holding sector-specific listening sessions at
dates and times to-be-determined. Information about those listening
sessions will be available on www.cisa.gov/circia when it becomes
available. Feedback from those listening sessions will be added to the
rulemaking docket for public consideration. Additionally, written
comments on proposed elements of the CIRCIA regulations may also be
submitted in response to CISA's RFI via the Federal eRulemaking Portal
identified by docket number CISA-2022-0010 through the duration of the
RFI's comment period.
IV. Key Inputs Solicited by the Agency
The below non-exhaustive list of topics, which mirrors those
contained in the RFI, is meant to assist members of the public in the
formulation of comments and is not intended to restrict the issues that
commenters may address:
(1) Definitions, Criteria, and Scope of Regulatory Coverage
a. The meaning of ``covered entity,'' consistent with the
definition provided in section 2240(5) of the Homeland Security Act of
2002 (as amended), taking into consideration the factors listed in
section 2242(c)(1).
b. The number of entities, either overall or in a specific industry
or sector, likely to be ``covered entities'' under the definition
provided in section 2240(5) of the Homeland Security Act of 2002 (as
amended), taking into consideration the factors listed in section
2242(c)(1).
c. The meaning of ``covered cyber incident,'' consistent with the
definition provided in section 2240(4), taking into account the
requirements, considerations, and exclusions in section 2242(c)(2)(A),
(B), and (C), respectively. Additionally, the extent to which the
definition of ``covered cyber incident'' under CIRCIA is similar to or
different from the definition used to describe cyber incidents that
must be reported under other existing federal regulatory programs.
d. The number of covered cyber incidents likely to occur on an
annual basis either in total or within a specific industry or sector.
e. The meaning of ``substantial cyber incident.''
f. The meaning of ``ransom payment'' and ``ransomware attack,''
consistent with the definitions provided in section 2240(13) and (14).
g. The number of ransom payments likely to be made by covered
entities on an annual basis.
h. The meaning of ``supply chain compromise,'' consistent with the
definition in section 2240(17).
i. The criteria for determining if an entity is a multi-stakeholder
organization that develops, implements, and enforces policies
concerning the Domain Name System (as described in section
2242(a)(5)(C)).
j. Any other terms for which a definition, or clarification of the
definition for the term contained in CIRCIA, would improve the
regulations and proposed definitions for those terms, consistent with
any definitions provided for those terms in CIRCIA.
(2) Report Contents and Submission Procedures
a. How covered entities should submit reports on covered cyber
incidents, the specific information that should be required to be
included in the reports (taking into consideration the requirements in
section 2242(c)(4)), any specific format or manner in which information
should be submitted (taking into consideration the requirements in
section 2242(c)(8)(A)), any specific information that should be
included in reports to facilitate appropriate sharing of reports among
federal partners, and any other aspects of the process, manner, form,
content, or other items related to covered cyber incident reporting
that would be beneficial for CISA to clarify in the regulations.
b. What constitutes ``reasonable belief'' that a covered cyber
incident has occurred, which would initiate the time for the 72-hour
deadline for reporting covered cyber incidents under section
2242(a)(1).
c. How covered entities should submit reports on ransom payments,
the specific information that should be required to be included in the
reports (taking into consideration the requirements in section
2242(c)(5)), any specific format or manner in which information should
be submitted (taking into consideration the requirements in section
2242(c)(8)(A)), and any other aspects of the process, manner, form,
content, or other items related to ransom payments that would be
beneficial for CISA to clarify in the regulations.
d. When should the time for the 24-hour deadline for reporting
ransom payments begin (i.e., when a ransom payment is considered to
have been ``made'').
e. How covered entities should submit supplemental reports, what
specific information should be included in supplemental reports, any
specific
[[Page 55833]]
format or manner in which supplemental report information should be
submitted, the criteria by which a covered entity determines ``that the
covered cyber incident at issue has concluded and has been fully
mitigated and resolved,'' and any other aspects of the process, manner,
form, content, or other items related to supplemental reports that
would be beneficial for CISA to clarify in the regulations.
f. The timing for submission of supplemental reports and what
constitutes ``substantial new or different information,'' taking into
account the considerations in section 2242(c)(7)(B) and (C).
g. What CISA should consider when ``balanc[ing] the need for
situational awareness with the ability of the covered entity to conduct
cyber incident response and investigations'' when establishing
deadlines and criteria for supplemental reports.
h. Guidelines or procedures regarding the use of third-party
submitters, consistent with section 2242(d).
i. Covered entity information preservation requirements, such as
the types of data to be preserved, how covered entities should be
required to preserve information, how long information must be
preserved, allowable uses of information preserved by covered entities,
and any specific processes or procedures governing covered entity
information preservation.
j. To clarify or supplement the examples provided in section
2242(d)(1), what constitutes a third-party entity who may submit a
covered cyber incident report or ransom payment report on behalf of a
covered entity.
k. How a third party can meet its responsibility to advise an
impacted covered entity of its ransom payment reporting
responsibilities under section 2242(d)(4).
(3) Other Incident Reporting Requirements and Security Vulnerability
Information Sharing
a. Other existing or proposed federal or state regulations,
directives, or similar policies that require reporting of cyber
incidents or ransom payments, and any areas of actual, likely, or
potential overlap, duplication, or conflict between those regulations,
directives, or policies and CIRCIA's reporting requirements.
b. What federal departments, agencies, commissions, or other
federal entities receive reports of cyber incidents or ransom payments
from critical infrastructure owners and operators.
c. The amount it typically costs and time it takes, including
personnel salary costs (with associated personnel titles if possible),
to compile and report information about a cyber incident under existing
reporting requirements or voluntary sharing, and the impact that the
size or type of cyber incident may have on the estimated cost of
reporting.
d. The amount it costs per incident to use a third-party entity to
submit a covered cyber incident report or ransom payment report on
behalf of a covered entity.
e. The amount it typically costs to retain data related to cyber
incidents.
f. Criteria or guidance CISA should use to determine if a report
provided to another federal entity constitutes ``substantially similar
reported information.''
g. What constitutes a ``substantially similar timeframe'' for
submission of a report to another federal entity.
h. Principles governing the timing and manner in which information
relating to security vulnerabilities may be shared, including any
common industry best practices and United States or international
standards.
(4) Additional Policies, Procedures, and Requirements
a. Policies, procedures, and requirements related to the
enforcement of regulatory requirements, to include the issuance of
requests for information, subpoenas, and civil actions consistent with
section 2244.
b. Information on protections for reporting entities under section
2245.
c. Any other policies, procedures, or requirements that it would
benefit the regulated community for CISA to address in the proposed
rule.
CISA notes that these public meetings are being held solely for
information and program-planning purposes. Inputs provided during the
public meetings do not bind CISA to any further actions.
Jennie M. Easterly,
Director, Cybersecurity and Infrastructure Security Agency.
[FR Doc. 2022-19550 Filed 9-9-22; 8:45 am]
BILLING CODE P